Download Method and apparatus for intuitive management of privacy settings
Transcript
US 20100280965Al (19) United States (12) Patent Application Publication (10) Pub. No.: US 2010/0280965 A1 Vesterinen et al. (54) (43) Pub. Date: METHOD AND APPARATUS FOR INTUITIVE (22) Filed: NOV. 4, 2010 Apr. 30, 2009 MANAGEMENT OF PRIVACY SETTINGS Publication Classi?cation (75) Inventors: Matti Vesterinen, Espoo (Fl); Matti Johannes Nelimarkka, (51) Int, Cl, G06Q 99/00 Helsinki (F1); Teem“ Haj“, 52 (2006.01) U s C] Masala (FD; Tomi Kulmala’ ( ) Helsinki (Fl); Ville Rantala, Mikkeli (Fl) (57) . . 705/319- 715/853' 709/204 . ........................ .. , , ABSTRACT An approach is provided for intuitive management of privacy settings, Which includes receiving data that indicates a con Correspondence Address: tact radius and an information radius. The contact radius is related to hoW socially close a contact is to a user Who is DITTHAVONG MORI & STEINER, RC. 918 Prince Street registered With a network service. The information radius is related to hoW private the information about the user is. In Alexandna’ VA 22314 (Us) response to a request from the contact for information about (73) Assignee? Nokia Corporation, ESPOO (F1) the user, information about the user is provided, Which has an (21) 12/433,714 the contact radius associated With the contact. information radius value in a range that is based on a value of Appl, NO; I I 400 k I /L 407 I Il Sharing service name / 405 437 l I ' . . Sharing email address 433 q Sharing phone number 425 Colleagiie C Sharing physical Close friend Patent Application Publication FIG- 1 Nov. 4, 2010 Sheet 1 0f 9 US 2010/0280965 A1 /, 123b NETWORK PRIVACY CLIENT , 100 k /\ 141 / // FIXED NODE m ACTIVITY TRACKER OTRER HOST __ 119 WEE; sERvER 1 17b @ NETWORK BROWsER 107 A.Ii___ WIRELESS LINK El 103 NETWORK SERVICES 131 I ___.i //x 139 CONTACT/ INFORMATION 121 RADIus MOBILE TERMINAL ENTRIES 117a BROWSER 133 NETWORK PRIVACY sERvIOE Q \\ MOBILE TERMINAL CLIENT f \\ Egg/06W | ACTIVITY TRAOKER 123a NETWORK PRIVACY E SOCIAL sERvIoE HOSTS SERVICE 137 sOOIAL sERvIcE DATABASE Patent Application Publication Nov. 4, 2010 Sheet 2 0f 9 US 2010/0280965 A1 FIG. 2 @ USER METADATA ENTRY @ USER ID _1 USER INFORMATION m PARAMETER ID 5 VALUE _7 INFORMATION RADIUS V219 @ USER CONTACT E CONTACT ID ‘v 229 E COMMUNICATIONS/PROXIMITY DATA @ CONTACT RADIUS Patent Application Publication Nov. 4, 2010 Sheet 3 0f 9 US 2010/0280965 A1 FIG. 3 m NETWORK PRIVACY SERVICE MODULE E ACTIVITY TRACKER | MODULE 317 E DEFAULT I/> DERIVATION E MODULE '\ RLFUS vALUEs MODULE i > 31_5 CONTACT/ ’ NETWOFWRWAOY ( CLIENT (OR BROWSER 117) > |NEORMAT|O E N MANUAL DATABASE RAD|Us <— INTERFACE OvERR|DE MODULE g API A I v E E SOCIAL NETWORK APPLICATION OTHER NETWORK SERVICE Patent Application Publication FIG. 4 Nov. 4, 2010 Sheet 4 0f 9 ,’ l 437 \/ School mate Sharing email address 433 Sharing phone number US 2010/0280965 A1 Patent Application Publication FIG. 5 500 k Nov. 4, 2010 Sheet 5 0f 9 US 2010/0280965 A1 @ I RECEIVE DEFAULT RADIUS FOR EACH USER METADATA PARAMETER AND CONTACT“I\ 511 I RECEIVE USER ACTIVITY DATA 513 I DERIVE CONTACT RADIUS BASED ON ACTIVITY DATA J‘— I k 515 STORE CONTACT/INFORMATION RADIUS DATA ‘IL 517 USER REQUEST TO SET PRIVACY? PRESENT UI WITH CIRCLES AND CONTACT ICONS BASED ON RADII RECEIVE RADIUS CHANGE DATA CONTACT REQUEST FOR USER INFO? ON ACTIVITY ALLOWED? PROVIDE USER INFORMATION ‘f. 533 BASED ON CONTACT RADIUS YES Patent Application Publication Nov. 4, 2010 Sheet 6 0f 9 US 2010/0280965 A1 FIG. 6 M 600 k I MONITOR USER ACTIVITY AND SEND UPDATES TO NETWORK PRIVACY SERVICE ‘|\ 601 I RECEIVE USER INPUT FOR PRIVACY SETTINGS SEND REQUEST TO SET PRIVACY I RECEIVE CONTACT/INFORMATION RADII RENDER CIRCLES OF INFORMATION AND ICONS OF CONTACTS BASED ON RADII |\ 609 f 619 CIRCLE SELECTED? RADHJS CHANGED, ASSOCIATE NEW INFORMATION RADIUS AND RENDER OIROLE AT NEW ' RADIUS f 623 ICON SELECTED? ASSOCIATE NEW CONTACT RADIUS CPHZSIIEEE'I, ' AND RENDER ICON BETWEEN APPROPRIATE OIROLES I /- 625 SEND RADIUS CHANGE DATA —>E] Patent Application Publication Nov. 4, 2010 Sheet 7 0f 9 US 2010/0280965 A1 FIG. 7 @ INTERNE%ERVICE PROVIDER LOCAL NETWORK 782 @ INTERNET \ 778 PET E NETWORK LINK sERvER 7—70 COMMUNICATION m , INTERFACE 710 / BUS m STORAGE m DEVICE MEMORY 702 PROESOR m APPLICATION SPECIFIC IC 7_05 a? READ ONLY MEMORY ‘i m POINTING DEVICE INPUT DEVICE 714 DISEAY Patent Application Publication Nov. 4, 2010 Sheet 8 0f 9 US 2010/0280965 A1 FIG. 8 800 PROCESSOR m DSP w ASIC @ A n M MEMORY @ Patent Application Publication Nov. 4, 2010 Sheet 9 0f 9 US 2010/0280965 A1 FIG. 9 MOBILE STATION 9 7 w I _ _ _ _ _5 r _________ _ _ | _9 I 905 l19 Eggs? 'J ? : :| CODEC v : ' DSP _ _ _ _ _ _ _ _ _ _ _ _ _ 939 / Down- 925 '| Equa?zer _ 941 / i : : _ Demodulator '- Cwverter : I : lmetifFace T 935 \ 1 9 7 : | _ _ _ _ _ _ 'I 921 i / : Synthesizer \933 Duplexer : | | I /ADC “@313: %<» i929 923 I ' : ' : II 1| I 5 § | ‘ Modulator —> C / 1 I U . p i | 2 CD I| 5+’ l____9g7____ __9_31_ _ _ _ _ _ _ ‘m/vener 919 I| J "EU-945"" MCU Keyboard f 947 MEMORY Battery Interface 81 95 90/3 Dismay f 907 I _ _ _ _ Powerr’controt _ 'I I SIM Carol :/949 92° _ _ _ _ __: Nov. 4, 2010 US 2010/0280965 A1 METHOD AND APPARATUS FOR INTUITIVE MANAGEMENT OF PRIVACY SETTINGS BACKGROUND [0001] There are a wide variety of social networking sites available over the Internet. These sites allow subscribers to de?ne some level of privacy settings to control what informa tion the subscriber is sharing with other subscribers. How ever, the available settings de?ne a rather course division of subscribers into groups, such as one group for those that the subscribers have mutually identi?ed as friends, another group for friends of friends at one or more levels of separation, another group for non-friend subscribers on one or more a regional networks, and a last group of non-friend subscribers in the entire social network. The subscriber’s personal infor mation is also divided into categories. The privacy settings allow an individual subscriber (a user) to assign to groups of the other subscribers access for the categories of information. While default assignments are often provided, it is tedious and dif?cult for the user to change all the defaults and manage the changed setting thereafter. Furthermore, it is not possible for the user to differentiate the information among other subscribers who fall within one of the groups of subscribers. For example, the user might not want to share the same information with all subscribers who are in the friends group, but rather might want to share some information with close with a network service. The information radius is related to how private the information about the user is. The apparatus includes a means for providing information about the user, in response to a request from the contact for information about the user. The provided information has an information radius value in a range that is based on a value of the contact radius associated with the contact. [0006] According to another embodiment, a method includes receiving data that indicates a contact radius and an information radius. The contact radius is related to how socially close a contact is to a user who is registered with a network service. The information radius is related to how private the information about the user is. In response to a request from the contact for information about the user, infor mation about the user is provided, which has an information radius value in a range that is based on a value of the contact radius associated with the contact. [0007] According to another embodiment, a method includes providing access to receive a request from a contact for information about a user who is registered with a network service. The method includes transferring information about the user, in response to receiving the request. The transferred information has an information radius value in a range that is based on a value of a contact radius associated with the contact. The contact radius is related to how socially close the contact is to the user. The information radius is related to how friends; while withholding that information from friends who private the information about the user is. are less close and acquaintances who both happen to be in the friends group. [0008] Still other aspects, features, and advantages of the invention are readily apparent from the following detailed Some Example Embodiments embodiments and implementations, including the best mode contemplated for carrying out the invention. The invention is also capable of other and different embodiments, and its description, simply by illustrating a number of particular [0002] Therefore, there is a need for a less tedious, more intuitive way to manage the private information shared among other subscribers than is currently available in social networks. [0003] According to one embodiment, a computer-read able storage medium carries instructions which, when several details canbe modi?ed in various obvious respects, all without departing from the spirit and scope of the invention. Accordingly, the drawings and description are to be regarded as illustrative in nature, and not as restrictive. executed by a processor, cause the one or more processors to BRIEF DESCRIPTION OF THE DRAWINGS at least perform receiving data that indicates a contact radius and an information radius. The contact radius is related to how socially close a contact is to a user who is registered with a network service. The information radius is related to how private is information about the user. In response to a request from the contact for information about the user, information about the user is provided, which has an information radius value in a range that is based on a value of the contact radius associated with the contact. [0004] According to another embodiment, an apparatus [0009] The embodiments of the invention are illustrated by way of example, and not by way of limitation, in the ?gures of the accompanying drawings, in which: [0010] FIG. 1 is a diagram of a system for managing infor mation privacy settings, according to one embodiment; [0011] FIG. 2 is a diagram of a user metadata entry, accord ing to one embodiment; [0012] FIG. 3 is a diagram of components of a network comprises a processor and a memory storing executable instructions that if executed cause the apparatus to receive privacy service module, according to one embodiment; data that indicates a contact radius and an information radius. The contact radius is related to how socially close a contact is to a user who is registered with a network service. The infor managing information privacy, according to one embodi ment; mation radius is related to how private the information about the user is. In response to a request from the contact for information about the user, the processor and memory are also con?gured to provide information about the user, which has an information radius value in a range that is based on a value of the contact radius associated with the contact. [0005] According to another embodiment, an apparatus comprises a means for receiving data that indicates a contact radius and an information radius. The contact radius is related to how socially close a contact is to a user who is registered [0013] [0014] FIG. 4 is a diagram of a graphical user interface for FIG. 5 is a ?ow diagram of a method at a server for managing information privacy, according to one embodi ment; [0015] FIG. 6 is a ?ow diagram ofa method at a user node for managing information privacy, according to one embodi ment; [0016] FIG. 7 is a diagram of hardware that can be used to implement an embodiment of the invention; [0017] FIG. 8 is a diagram ofa chip set that can be used to implement an embodiment of the invention; and Nov. 4, 2010 US 2010/0280965 A1 [0018] FIG. 9 is a diagram ofa terminal that can be used to implement an embodiment of the invention. DETAILED DESCRIPTION OF EXAMPLE EMBODIMENTS [0019] A method, apparatus, and software are disclosed for intuitive management of privacy settings. In the following description, for the purposes of explanation, numerous spe ci?c details are set forth in order to provide a thorough under standing of the embodiments of the invention. It is apparent, hoWever, to one skilled in the art that the embodiments of the invention may be practiced Without these speci?c details or With an equivalent arrangement. In other instances, Well knoWn structures and devices are shoWn in block diagram enhanced data rates for global evolution (EDGE), general packet radio service (GPRS), global system for mobile com munications (GSM), Internet protocol multimedia subsystem (IMS), universal mobile telecommunications system (UMTS), etc., as Well as any other suitable Wireless medium, e.g., microWave access (WiMAX), Long Term Evolution (LTE) netWorks, Wireless ?delity (WiFi), satellite, and the like. In various embodiments, communication netWork 105, or portions thereof, can support communication using any protocol, for example, the Internet Protocol (IP). [0024] Information is exchanged betWeen netWork nodes of system 100 according to one or more of many protocols (including, e.g., knoWn and standardized protocols). In this context, a protocol includes a set of rules de?ning hoW the form in order to avoid unnecessarily obscuring the embodi nodes interact With each other based on information sent over ments of the invention. the communication links. The protocols are effective at dif [0020] Although several embodiments of the invention are discussed With respect to information gathered at a mobile terminal With a Wide arrangement of data gathering mecha nisms for a user of a single social netWork, embodiments of the invention are not limited to this context. It is explicitly anticipated that in some embodiments the user is operating at a ?xed terminal With many feWer data gathering mechanisms or at different times on one or more of multiple devices of ferent layers of operation Within each node, from generating and receiving physical signals of various types, to selecting a link for transferring those signals, to the format of informa tion indicated by those signals, to identifying Which softWare application executing on a computer system sends or receives the information. The conceptually different layers of proto cols for exchanging information over a netWork are described in the Open Systems Interconnection (OSI) Reference mixed data gathering capability and mobility, as a subscriber Model. The OSI Reference Model is generally described in to one or more netWork services that might or might not be classi?ed as social netWork services. more detail in Section 1.1 of the reference book entitled [0021] FIG. 1 is a diagram of a system 100 for managing information privacy settings, according to one embodiment. The system includes netWork 105 and netWork nodes identi ?ed as mobile terminal 120, social service hosts 130 and other host 140. [0022] Invarious embodiments, nodes 120,130, 140 can be any type of ?xed terminal, mobile terminal, or portable ter minal including desktop computers, laptop computers, hand sets, stations, units, devices, multimedia tablets, Internet nodes, communicators, Personal Digital Assistants (PDAs), mobile phones, mobile communication devices, audio/video players, digital cameras/camcorders, televisions, digital video recorders, game devices, positioning devices, or any combination thereof. Moreover, the nodes may have a hard Wired energy source (e. g., a plug-in poWer adapter), a limited energy source (e.g., a battery), or both. It is further contem plated that the nodes 120, 130, 140 can support any type of interface to the user (such as “Wearable” circuitry, etc.). In the illustrated embodiment, node 120 is a Wireless mobile termi nal (also called a mobile station and described in more detail beloW With reference to FIG. 9). The mobile terminal 120 is connected to netWork 105 by a Wireless link 107. “Interconnections Second Edition,” by Radia Perlman, pub lished September 1999. [0025] The client-server model of computer process inter action is Widely knoWn and used. According to the client server model, a client process sends a message including a request to a server process, and the server process responds by providing a service. The server process may also return a message With a response to the client process. Often the client process and server process execute on different computer devices, called hosts, and communicate via a netWork using one or more protocols for netWork communications. The term “server” is conventionally used to refer to the process that provides the service, or the host computer on Which the pro cess operates. Similarly, the term “client” is conventionally used to refer to the process that makes the request, or the host computer on Which the process operates. As used herein, the terms “client” and “server” refer to the processes, rather than the host computers, unless otherWise clear from the context. In addition, the process performed by a server can be broken up to run as multiple processes on multiple hosts (sometimes called tiers) for reasons that include reliability, scalability, and redundancy, among others. A Well knoWn client process available on most nodes connected to a communications net By Way of example, the communication netWork Work is a World Wide Web client (called a “Web broWser,” or 105 of system 100 can include one or more Wired and/or simply “broWser”) that interacts through messages formatted according to the hypertext transfer protocol (HTTP) With any [0023] Wireless netWorks such as a data netWork (not shoWn), a Wireless netWork (not shoWn), a telephony netWork (not of a large number of servers called World Wide Web servers shoWn), or any combination thereof, each comprised of Zero that provide Web pages. In the illustrated embodiment, or more nodes. It is contemplated that the data netWork may be any local area netWork (LAN), metropolitan area netWork (MAN), Wide area netWork (WAN), the Internet, or any other suitable packet-sWitched netWork, such as a commercially mobile terminal 120 and other host 140 include broWser 117a oWned, proprietary packet-sWitched netWork, e.g., a propri etary cable or ?ber-optic netWork, or any combination thereof. In addition, the Wireless netWork may be, for example, a cellular netWork and may employ various tech and broWser 117b, respectively; and hosts 130 include Web server 119. [0026] Social service hosts 130 include a social netWork service module 131 and a netWork privacy service module 133, as Well as the Web server module 119 described above. The different modules depicted on social service hosts 130 may reside at one or more different locations in netWork 105. nologies including code division multiple access (CDMA), The social netWork service module 131 provides social net Wideband code division multiple access (WCDMA), Working services that alloW multiple subscribers (i.e., regis Nov. 4, 2010 US 2010/0280965 A1 tered users) to share certain types of information. Several graphical user interface elements of a Web broWser 117 in social networks are knoWn in the art such as FACEBOOKTM concert With Web pages generated for this purpose by Web server 119 responding to the netWork privacy service module 133. In such embodiments, a separate netWork privacy client module 123 is omitted. for sharing digital photos and digital text including favorite links to Web pages. NOKIATM OVITM is a social netWork for sharing music, location data and other media that might be gathered or rendered, or both, on a mobile device, such as a [0032] cell phone. tact radii for a user of mobile terminal 120 are derived based, at least in part, on user activity on the mobile terminal 120. As used herein, activity on the mobile terminal includes one or [0027] Network privacy service module 133 provides an intuitive Way to provide privacy setting for user information at any granularity indicated directly or indirectly by the user. The netWork privacy service module obtains, for each user, data about the relative privacy of different information about the user and the relative closeness of different persons, called contacts, Who come into communication or physical contact With the user. Neither the user nor the contact need be a subscriber to the netWork privacy service, but might be a subscriber to one or more different netWork services, such as an email service or a neWs stream service; and that different service utiliZes the netWork privacy service. Thus as used here, a contact is an entity, such as person or organization or netWork service With Whom the user has communicated, Whether that entity is a registered user of a particular social netWork service or not. In FIG. 1, other netWork services 103 are depicted in netWork 105. In some embodiments, information radii and con more netWork communications With each of one or more contacts, or proximity of mobile terminal 120 to the address or mobile location of each of one or more contacts, or some combination. In such embodiments, the mobile terminal 120 includes a mobile terminal activity tracker module 121 that detects those communications and proximity events and reports those activities, or statistical data or radii derived from them, to the netWork privacy service module 133 over net Work 105. Similarly, if the other host 140 is a ?xed terminal in such embodiments, then the other host 140 includes a ?xed terminal activity tracker module 141 that detects those com munications and reports those activities, or statistical data or radii derived from them, to the netWork privacy service mod ule 133. The derivation of activity statistics or a radius from activity data is described in more detail beloW With reference [0028] According to the illustrated embodiments, both the relative degree of privacy for particular user information and to FIG. 3 the relative closeness to the user of a contact are represented data structures are shoWn in FIG. 1 for purposes of illustra tion, in various other embodiments more or feWer nodes, processes and data structures are involved. Furthermore, although processes and data structures are depicted as par by numerical values (each called a radius). The relative degree of privacy is called the information radius. The relative closeness of a contact is called the contact radius. In the illustrated embodiments, the information radius and the con tact radius are on the same scale. HoWever, in other embodi ments, the numerical values used for information radius is on a different scale than the numerical values used for contact radius; and, a scale factor or transform algorithm is used to convert values in one scale to corresponding values in the other scale. [0029] A contact is provided With user information Which has an information radius value in a range that is based on a value of a contact radius associated With the contact. For example, in some embodiments, a contact has access to all user information With an information radius greater than or equal to the contact’s contact radius, but not to any informa tion With an information radius less than the contact’s contact radius. [0030] The modules on social service hosts 130 store and retrieve data from one or more social service data structures, such as social service database 137. In the illustrated embodi ment, the social service database includes, for one or more users, entries 139 for contact radius and information radius [0033] Although a particular set of nodes, processes, and ticular blocks in a particular arrangement for purposes of illustration, in other embodiments each process or data struc ture, or portions thereof, may be separated or combined or arranged in some other fashion. For example, in some embodiments, the Web server 119 is included in the netWork privacy service module 133. In some embodiments, the net Work privacy service module 133 is included in the social netWork service module 131. LikeWise, in some embodi ments, the mobile terminal activity tracker is included in the netWork privacy client module 12311. In some embodiments, the netWork privacy client module 123 is a plug in application for the broWser 117. In some embodiments, user input is provided via broWser 117 and privacy client 12311 is omitted. [0034] FIG. 2 is a diagram of a user metadata entry 201, according to one embodiment. In this embodiment, the user metadata entry 201 includes contact/information radius entries 139 among the included ?elds. The included ?elds are user identi?cation (ID) ?eld 203, user information ?eld 211 and other user information ?elds indicated by ellipsis 219, and user contact ?eld 221 and other user contact ?elds indi data (called contact/information radius entries 139). cated by ellipsis 229. [0031] The mobile terminal 120 includes the Web broWser 117a, described above, a mobile terminal activity tracker module 121, and a netWork privacy client module 123a. Simi larly, the other host 140 includes the Web broWser 117b, described above, a ?xed node activity tracker module 121, and a netWork privacy client module 1231). The netWork pri vacy client modules 123a, 123b, collectively referenced here [0035] User ID ?eld 203 holds data that indicates a particu lar user among all the netWork users Whose privacy settings are managed by the netWork privacy service 133. In some embodiments, user ID ?eld 203 holds multiple user IDs, if inafter as netWork privacy client module 123, interface With a user of the local node and communicate With the netWork privacy service module 133 to provide the information even tually stored in the contact/information radius entries 139. In some embodiments, the functions of the netWork privacy client 123 are accomplished by a combination of standard knoWn, for the same user as that user presents himself or herself to multiple netWork services 103 and social netWork service 131. [0036] User information ?eld 211 holds data that indicates information about the user that might be shared With one or more other users of netWork services 103 and social netWork service module 131 or With the user’s contacts Who are not registered users. The user information ?eld includes a param eter identi?er (ID) ?eld that indicates a particular parameter Nov. 4, 2010 US 2010/0280965 A1 of all those used to describe the user and a value ?eld 215 that holds data that indicates a value for the particular parameter. According to the illustrated embodiment, the user informa tion ?eld includes an information radius ?eld 217 that holds data that indicates the relative privacy indicated by the user’s actions for the parameter indicated in ?eld 213. Fields for other parameters used to describe the user are indicated by ellipsis 219. Example parameters used to describe a user, and or indirectly to netWork 105. In some other embodiments, one or more depicted ?elds or portions thereof are omitted, or additional ?elds are included. physical address(es), email address(es), political persuasion, [0041] FIG. 3 is a diagram of components of a netWork privacy service module 311, according to one embodiment. Network privacy service module 311 is a particular embodi ment of netWork privacy service module 133 depicted in FIG. 1. The netWork privacy service module 311 interacts With the netWork privacy client module 123, the social netWork appli cation 131, and other netWork services 103 depicted in FIG. 1. The netWork privacy service module 311 also interacts With religious persuasion, Websites, favorite foods, favorite mer chants, favorite books, movies, music and other media, club an activity tracker module 3 02, such as mobile terminal activ ity tracker module 121 or ?xed node activity tracker module memberships, and netWork service(s) to Which user sub scribes, among other parameters. In some embodiments, the parameter described by a value indicated in value ?eld 215 is implied by the position of the user information ?eld 21 1 in the user metadata entry 201, and the parameter ?eld 213 is omit ted. [0037] User contact ?eld 221 holds data that indicates a 141 depicted in FIG. 1. In the illustrated embodiment, the netWork privacy service module 311 includes a default values module 313, a contact/information database interface 315, a radius derivation module 317, manual radius override module stored in one or more user information ?elds 211 and 219, are one or more of actual and logon name(s), gender, birthdate, contact of the user, With Whom the user has been in commu nication or physical proximity or both. The user contact ?eld 221 includes a contact identi?er (ID) ?eld 223, a communi cations/proximity data ?eld 225, and a contact radius ?eld 319, and an application programming interface (API) 321. Speci?cations for the API 321 are promulgated to developers of the social netWork application 131 and other netWork ser vice 103, so that those services can request information about a user for a given contact. The API 321 receives any requests from these services and replies With the parameters or values that the speci?ed contact has access to. For example, the 227. The contact ID ?eld 223 holds data that indicates a particular contact of the user, such as an User ID for that contact, if the contact is also a subscriber to the netWork service module 133 or one of the netWork services 103 or 131, module 311 provides through the API data that indicates the or an email address or a Website address. module 311 to request and obtain information from the social netWork application 131 of other netWork service 103, such as [0038] The communications/proximity data ?eld 225 holds user, the contact and the contact radius, in response to a request from a different netWork service 131 or 103. Simi larly, the API 321 is used by the netWork privacy service data that indicates the medium and amount of time the user the group in Which a particular contact of a particular user has been in contact With the entity identi?ed in ?eld 223, belongs. either by communication or by physical proximity. Commu [0042] nication contacts can be determined in any manner knoWn in contact radius values for a user’s contacts and default infor the art. For example in some embodiments, communication contact is determined by a cell phone capable mobile terminal based on cell phone call number and duration in call logs, and based on text messages (e.g., sent via the short message mation radius values for categories of user information. For purposes of illustration, it is assumed that the default infor mation categories and contact groups and associated radii are as indicated in Table. 1. It is further assumed that the infor service, SMS, protocol). Communication contact is deter mation radius and the contact radius use the same scale. It is further assumed that a contact has access to all information about a user With an information radius greater than or equal to the contact’s contact radius, but not to any information With an information radius less than the contact’s contact radius. mined by most netWork nodes, Whether or not they are mobile terminals, based on number of and language contained in emails, instant messages, visits and text provided to the con tact’s social page or visits and text on the user’s Web page by the contact, among others, alone or in some combination. The default values module 313 produces default Proximity contacts can be determined in any manner knoWn TABLE 1 in the art. For example in some embodiments, proximity contact is determined by a global positioning system (GPS) capable mobile terminal log of position by time, or detection Example, default radius values for infoimation and contact groups Information category Infoimation radius of the contact’s Wireless short range broadcasts (e.g., Blue tooth signals), or by most ?xed netWork nodes based on an address associated With the user of the ?xed terminal, among others, alone or in some combination. [0039] Physical location 1 Phone number Email address 2 3 S ervice name 4 According to the illustrated embodiment, the user contact ?eld 221 includes a contact radius ?eld 227 that holds data that indicates the relative closeness of the contact to the user as indicated by the user’s actions, and possibly also by the contact’s actions, as described in more detail beloW. Fields for other contacts of the user are indicated by ellipsis 229. [0040] Although the depicted ?elds in FIG. 2 are shoWn as integral blocks of data in a particular order in a single data structure for purposes of illustration, in other embodiments one or more ?elds, or portions thereof, are arranged in a Contacts group Contact radius Friends Friends of friends 2.5 3.5 Regional network 3.5 Other contacts Others 3.5 5 [0043] According to the default values in Table 1, no con tact is given access to the user’s physical location (e.g., home different order in one or more data structures in one or more address or current GPS position) or given access to the user’s databases residing on one or more nodes connected directly phone number. The default values alloW contacts in a friends Nov. 4, 2010 US 2010/0280965 A1 group to access the user’s email and service name (e.g., Mike the Marvelous). The default values alloW contacts in the friends of friends group, the regional netWork group, and the other contacts group to access only the user’s service name. An entity Which does not fall into any of these previous groups, e.g., a person or organization or netWork service With Whom the user has never communicated, falls into the others group and is given access to none of the user’s information, duration of physical proximity, among other factors, alone or in any combination. The modi?ed radius value, if any, is then stored in the database in place of the default value. For pur poses of illustration it is assumed that the communications/ proximity data and revised contact radius stored in the user metadata entry for UserA as a result of operation of the radius derivation module 317 are as shoWn in Table 3. For purposes of illustration it is assumed that the communications/proxim not even to the service name. ity data ?eld includes four portions separated by slashes in [0044] Table 3, Which report on: (1) the number of communications; (2) the median proximity; (3) the average duration of a com The contact/information database interface module 315 is used to store and retrieve data from one or more databases With the contact radius and information radius data munication; and (4) the frequency of communications, for one or more users, such as database 137. Any database respectively. In other embodiments other data are included in the communications/proximity data ?eld 225, such as type of interface may be used. For example, the default values of Table l are used to initially ?ll or update the radius ?elds 217 and 227 of the user metadata entry 201 for a particular user, UserA. An association of a contact ID With a contact group, and therefore the appropriate contact radius, is determined based on information stored in a ?eld (not shoWn) in the user contact ?eld 221 or obtained from a social netWork applica information in the communications or occurrence of the spe ci?c private user information in a communication With the contact. Thus the one Friends group is further divided to produce a ?ner granularity of relationships than provided by the default settings or prior approaches. tion 131, e.g., through API 321. For purposes ofillustration, it is assumed that userA has 6 contacts, 5 of Whom are in the friends group, and one of Whom is in the other contacts group. After the default settings, the user metadata entry 201 for UserA is shoWn in Table 2. TABLE 2 Example metadata entry for userA after default module UserA Parameter ID Value Info radius Physical location 15.0000N, 15.0000E 1 Phone number 999-555-1234 2 Email address [email protected] 3 Service name Mike the Marvelous 4 Communications/ Contact ID/name (group) proximity data Contact radius 4l3/Pa1tner (Friend) 4l5/Close.Friend (Friend) 4l7/School.Mate (Friend) none none none 2.5 2.5 2.5 42l/Colleague.A (Friend) none 423/Colleague.B (Other Contact) none 425/Colleague.C (Friend) none 2.5 3.5 2.5 [0045] The radius derivation module 317 receives activity date from the activity tracker module 301 and derives any modi?cations to the radius values already stored in the data base, e.g., database 137. In some embodiments, the activity data received or statistical summaries of that data are stored TABLE 3 Example metadata entry for user A after radius derivation module UserA Parameter ID Value Info radius Physical location 15.0000N, 15.0000E 1 Phone number 999-555-1234 2 Email address [email protected] 3 Service name Mike the Marvelous 4 Contact Contact ID/name (group) Communications/proximity data radius 4l3/Partner (Friend) Many/close/long While/every day 0.1 4l5/Close.Friend (Friend) 4l7/School.Mate (Friend) 42 l/Colleague.A (Friend) Many/close/medium While/often FeW/far/long While/rare FeW/close/ short While/rare 0.5 2.5 2.5 423/Colleague.B FeW/not close/short While/rare 3.5 Many/close/short/average 1.5 (Other Contact) 425/Colleague.C (Friend) [0047] The manual radius override module 319 sends the current privacy setting for presentation to the user, e.g., by generating a Web page in response to a Web page request form a broWser 117, or by sending a message in response to a request from a special purpose netWork privacy client module 123. The manual radius override module 319 receives data indicating any user changes to the information radius or con tact radius and stores the result in the database through the contact/information database interface 315. In some embodi ments, the presentation of the information and contact radius by the radius derivation module 317 in the database, e.g., in to the user is a graphical user interface that maps icons rep the communications/proximity data ?eld 225 of the user resenting the contacts into circles representing the different degrees of privacy of the user information. metadata entry 201, based on the user and contact or infor mation involved in the activity. Any method may be used to [0048] derive a radius that re?ects the relative closeness of a contact for intuitively managing information privacy, according to or the relative privacy of the information parameter from the user’s activity involving the user’s contact. [0046] In various embodiments, the radius derivation mod nested circles to represent the different information radii for ule determines a radius based on the frequency and duration of communications With a contact, the type of information included in the communications With the contact, the similar ity betWeen the metadata of the user and the metadata of the embodiments, the nested circles are concentric. For example, in FIG. 4, the four radii 1,2,3 and 4 for the four pieces ofuser contact, the similarity of the metadata of the contact With the metadata of another contact for Whom the user has provided a manual value of the contact radius, and the frequency and FIG. 4 is a diagram of a graphical user interface 400 one embodiment. The graphical user interface 400 includes the user. Circles are nested When the circle With the smaller radius lies entirely Within a circle With a larger radius. In some information in the example: (physical location, phone num ber, email address and service name, respectively), are shoWn by the four nested circles, circle 401, circle 403, circle 405 and circle 407, respectively. In some embodiments, the infor Nov. 4, 2010 US 2010/0280965 A1 mation associated With each circle is indicated by a label giving the name of the parameter shared in that circle, e.g., label 431, label 433, label 435 and label 437 for circle 401, circle 403, circle 405, and circle 407, respectively. [0049] The graphical user interface 400 also includes an icon (such as a default graphical ?gure, a photo image or avatar) to represent each contact of the user. In the illustrated embodiment, the icon includes a name for the contact. Each icon is positioned inside the innermost nested circle With a radius greater than or equal to the contact radius of that contact. Each contact is granted access to the information associated With all the circles the icon associated With the contact is inside. The user is implicitly in the innermost circle and in some embodiments the user is also represented by an icon, e.g., icon 411 representing UserA, labeled “Me” in FIG. 4. For example, each of UserA’s contacts’ icons, labeled by the contact ID number, is placed in the proper circle. The icons can be moved around to avoid obscuring each other as long as they are based in the correct annular or circular area. Thus, the user can readily and intuitively determine What information is granted to Which contacts. In embodiments With concentric circles, each icon is simply plotted at a dis tance equal to that icon’s corresponding contact radius from the shared center of the circles. To avoid obscuring icons With equal or similar radii, each icon can be plotted at its radius from the center but at a different angle. [0050] For example, contact icon 413 (Partner) and contact icon 415 (Close Friend) With contact radii 0.1 and 0.5, respec tively (both less than 1.0), are in the innermost circle With information radius 1, representing access to the UserA’s physical location. These contacts also have access to the information represented by the outer circles 403, 405 and 407. Similarly, contact 425 (Colleague C), With contact radius 1.5, lies outside the innermost circle 401 With information radius 1 and inside the second circle 403, With radius 2, Which represents access to UserA’s phone number. This contact is denied access to UserA’s physical location in the circle With a smaller radius, but is granted access to UserA’s phone number and information represented by the outer circles 405 and 407. Contact 417 (School Mate) and contact 421 (Colleague A) With contact radii of 2.5, lie outside the second circle 403 With information radius 2 and inside the third circle 405, With radius 3, Which represents access to UserA’s email address. user can activate a button graphical element (not shoWn) to add a neW circle and select a neW parameter ID (e. g., from a pull doWn menu, not shoWn) to associate With the neW circle. [0052] Similarly, the user can change the innermost circle associated With a contact by using a pointing device to place a cursor on the icon to select the icon, and then drag the curser to change the position of the icon. The icon is given a neW radius to comport With the values of the tWo circles the moved icon noW lies betWeen, and any other icon that lies closer or father from the center of the destination circle. Alternatively, the user can activate a button graphical element (not shoWn) to add a neW icon and select a neW contact ID (e.g., from a pull doWn menu, not shoWn) to associate With the neW icon. [0053] Although FIG. 4 depicts all icons as identical for purposes of illustration, in other embodiments the icons of different contacts may be different. For example, the icon is an image of the individual in some embodiments; or a differ ent icon is used for each group of individuals in other embodi ments. It is the position of the icon, not the shape of the icon, that indicates the access to private information in the illus trated embodiments. [0054] FIG. 5 is a How diagram ofa method 500 at a server for managing information privacy, according to one embodi ment. Although steps in FIG. 5 and subsequent ?oW chart FIG. 6 are shoWn in a particular order for purposes of illus tration, in other embodiments, one or more steps may be performed in a different order or overlapping in time, in series or in parallel, or one or more steps may be omitted or added, or changed in some combination of Ways. [0055] In step 501, a default information radius is received for each user metadata parameter and a default contact radius is received for each contact of the user. Any method may be used to receive this data. For example, in various embodi ments, the data is included as a default value in softWare instructions, is received as manual input from a netWork service administrator on the local or a remote node, is retrieved from a local ?le or database, or is sent from a different node on the netWork, either in response to a query or unsolicited, or the data is received using some combination of these methods. In an illustrated embodiment, step 501 is accomplished by the default values module 313. [0056] In step 513, user activity data is received, e.g., from These contacts are denied access to UserA’s physical location activity tracker module 301, as described above With refer and phone number in the circles With smaller radii, but are granted access to UserA’s email address and information ence to the activity tracker module 301. In step 515, a contact radius or information radius is derived from the activity data as described above With reference to the radius derivation represented by the outer circle 407. Contact 423 (Colleague B), With contact radius 3.5, lies outside the third circle 405 module 317. In some embodiments Without a radius deriva With information radius 3 and inside the fourth circle 407, With radius 4, Which represents access to UserA’s service tion module 317, step 513 and step 515 are omitted. [0057] In step 517, the contact radius values and informa name. This contact is denied access to UserA’s physical loca tion radius values for one or more users are stored, e.g., as a tion, phone number and email address in the circles With user metadata entries such as entry 201 in database 137, described above. [0058] In step 519, it is determined Whether a user request is received to set privacy. If so, then in step 521 the user is presented With a user interface (UI) to make the changes to a contact radius or information radius. For example, a message smaller radii, but is granted access to UserA’s service name. [0051] In some embodiments, the user can intuitively pro vide manual input to change the privacy settings by changing a circle’s radius, or moving an icon to a different position among the circles, or both. For example, the user can operate a pointing device to place a cursor on a circle to select the is sent to a netWork privacy client 123 or a Web page is sent to circle and then drag the curser to change the radius of that the broWser 117 on the user’s device (e.g., mobile terminal circle to encompass more or feWer icons or to change the 120) to present the graphical user interface 400. In step 523, the radius change data is received, e.g., in an HTTP message from the broWser 117 or a message from the netWork privacy client 123. The changed radius information is stored in step 517. relative privacy. For example, to make the phone number less private than the email address, the user can drag circle 405 to give it a smaller radius, and then drag circle 403 to give it a bigger radius, until it is outside circle 405. Alternatively, the Nov. 4, 2010 US 2010/0280965 A1 [0059] If, as determined in step 519, a request to set privacy is not received, then it is determined in step 525 Whether activity data is received. If so, then it is determined in step 527 Whether change of radius is alloWed based on activity. In some embodiments, manually input radius values may not be change based on activity data, so the receipt of activity data for a user Who already provided manual radius input in step 523 is not alloWed in step 527. In some embodiments, the user’s manual import is considered along With the activity data; and, therefore in such embodiments, adjustments to the radius values are alloWed. If a change in radius based on activity data is alloWed, then the change or changes are a neW circle being added. If not, then the checks of step 611, step 613 or step 615 are repeated. If so, then in step 619, the neW radius is associated With the information of the existing or neW circle and the circle is rendered at the neW radius. [0068] If it is determined that anicon is selected in step 613, then it is determined in step 621 Whether the icon position is changed, e.g., by detecting an existing icon being dragged or a neW icon being added. If not, then the checks of step 611, step 613 or step 615 are repeated. If so, then in step 623, a neW contact radius based on the position is associated With the contact of the existing or neW icon; and, the icon is rendered derived in step 515 based on the neW activity data received in inside the correct one or more circles based on the neW radius. step 525. [0060] If activity data is not received, or radius changes e.g., because the neW radius data is to be submitted, then in based on received activity data are not alloWed, then in step 531 it is determined Whether a contact is requesting user information. The request may be directly from the contact or indirectly from a netWork service the contact subscribes to, e.g., a social netWork service 131. In some embodiments, the contact is the netWork service. [0061] If no such request is received, then it is determined in step 535 Whether to end the process. If so, then the process ends. If not, then the next message is examined to determine Whether it is a request to set privacy in step 519 or more activity data in step 525 or a request from a contact for user information in step 531. [0062] FIG. 6 is a How diagram of a method 600 at a user node for managing information privacy, according to one embodiment. The steps of method 600 may be performed by [0069] If it is determined that the process ends in step 615, step 625 the radius change data is sent, e.g., to the netWork privacy service module 133 or 311. Then the process ends. [0070] The processes described herein for intuitive privacy settings may be implemented via softWare, hardWare (e.g., general processor, Digital Signal Processing (DSP) chip, an Application Speci?c Integrated Circuit (ASIC), Field Pro grammable Gate Arrays (FPGAs), etc.), ?rmWare or a com bination thereof. Such example hardWare for performing the described functions is detailed beloW. [0071] FIG. 7 illustrates a computer system 700 upon Which an embodiment of the invention may be implemented. Computer system 700 includes a communication mechanism such as a bus 710 for passing information betWeen other one or more modules on a user node, such as on mobile internal and external components of the computer system 700. Information (also called data) is represented as a physi cal expression of a measurable phenomenon, typically elec terminal 120 or other host 140. tric voltages, but including, in other embodiments, such phe [0063] In step 601, user activity on the node is monitored to cull data about the communication and proximity of the user With various contacts, as described above for the activity tracker module 301. [0064] In step 603, user input is received indicating a desire for privacy settings, either to revieW current setting or to nomena as magnetic, electromagnetic, pressure, chemical, biological, molecular, atomic, sub-atomic and quantum inter actions. For example, north and south magnetic ?elds, or a Zero and non-Zero electric voltage, represent tWo states (0, l) of a binary digit (bit). Other phenomena can represent digits of a higher base. A superposition of multiple simultaneous change one or more settings. For example, a curser activate operation is detected When a cursor lies over a graphical quantum states before measurement represents a quantum bit (qubit). A sequence of one or more digits constitutes digital element representing a privacy setting tab. In step 605, a request to set privacy is sent, e.g., to the netWork privacy data that is used to represent a number or code for a character. service module 133 or 311. In step 607 contact radii and information radii data is received, e.g., in a Web page at a broWser 117 or in a message to a netWork privacy client module 123. [0065] In step 609 a graphical user interface, such as GUI resented by a near continuum of measurable values Within a 400, is presented to the user by rendering circles at the infor mation radii for the user and rendering icons representing In some embodiments, information called analog data is rep particular range. [0072] A bus 710 includes one or more parallel conductors of information so that information is transferred quickly among devices coupled to the bus 710. One or more proces sors 702 for processing information are coupled With the bus 710. [0073] A processor 702 performs a set of operations on contacts at positions Within the innermost circle With a radius greater than the contact radius, as shoWn in FIG. 4. information. The set of operations include bringing informa [0066] tion in from the bus 710 and placing information on the bus In step 611, it is determined Whether a circle is selected, e.g., by detecting an activated pointing device While 710. The set of operations also typically include comparing a cursor is positioned near a circle edge or an “add circle” process is done, e.g., by detecting an activatedpointing device tWo or more units of information, shifting positions of units of information, and combining tWo or more units of informa tion, such as by addition or multiplication or logical opera tions like OR, exclusive OR @(OR), and AND. Each opera tion of the set of operations that can be performed by the processor is represented to the processor by information While a cursor is positioned over a “Submit” button. If not, called instructions, such as an operation code of one or more then the checks of step 611, step 613 or step 615 are repeated. [0067] If it is determinedthat a circle is selected in step 611, then it is determined in step 617 Whether a circle radius is digits. A sequence of operations to be executed by the pro button. If not, then it is determined in step 613 Whether an icon is selected, e.g., by detecting an activated pointing device While a cursor is positioned near an icon or an “add contact” button. If not, then it is determined in step 615 Whether the changed, e.g., by detecting an existing circle being dragged or cessor 702, such as a sequence of operation codes, constitute processor instructions, also called computer system instruc tions or, simply, computer instructions. Processors may be Nov. 4, 2010 US 2010/0280965 A1 implemented as mechanical, electrical, magnetic, optical, chemical or quantum components, among others, alone or in combination. [0074] Computer system 700 also includes a memory 704 coupled to bus 710. The memory 704, such as a random access memory (RAM) or other dynamic storage device, stores information including processor instructions. Dynamic memory alloWs information stored therein to be changed by the computer system 700. RAM alloWs a unit of information stored at a location called a memory address to be stored and retrieved independently of information at neighboring processors are connected. For example, communication interface 770 may be a parallel port or a serial port or a universal serial bus (USB) port on a personal computer. In some embodiments, communications interface 770 is an inte grated services digital netWork (ISDN) card or a digital sub scriber line (DSL) card or a telephone modem that provides an information communication connection to a correspond ing type of telephone line. In some embodiments, a commu nication interface 770 is a cable modem that converts signals on bus 710 into signals for a communication connection over a coaxial cable or into optical signals for a communication addresses. The memory 704 is also used by the processor 702 to store temporary values during execution of processor instructions. The computer system 700 also includes a read only memory (ROM) 706 or other static storage device connection over a ?ber optic cable. As another example, communications interface 770 may be a local area netWork (LAN) card to provide a data communication connection to a compatible LAN, such as Ethernet. Wireless links may also coupled to the bus 710 for storing static information, includ be implemented. For Wireless links, the communications ing instructions, that is not changed by the computer system interface 770 sends or receives or both sends and receives 700. Some memory is composed of volatile storage that loses the information stored thereon When poWer is lost. Also coupled to bus 710 is a non-volatile (persistent) storage device 708, such as a magnetic disk, optical disk or ?ash card, electrical, acoustic or electromagnetic signals, including infrared and optical signals, that carry information streams, for storing information, including instructions, that persists even When the computer system 700 is turned off or otherWise loses poWer. [0075] Information, including instructions, is provided to the bus 710 for use by the processor from an external input device 712, such as a keyboard containing alphanumeric keys operated by a human user, or a sensor. A sensor detects such as digital data. For example, in Wireless handheld devices, such as mobile telephones like cell phones, the com munications interface 770 includes a radio band electromag netic transmitter and receiver called a radio transceiver. [0078] The term computer-readable medium is used herein to refer to any medium that participates in providing infor mation to processor 702, including instructions for execution. Such a medium may take many forms, including, but not limited to, non-volatile media, volatile media and transmis conditions in its vicinity and transforms those detections into sion media. Non-volatile media include, for example, optical physical expression compatible With the measurable phe or magnetic disks, such as storage device 708. Volatile media nomenon used to represent information in computer system include, for example, dynamic memory 704. Transmission media include, for example, coaxial cables, copper Wire, ?ber 700. Other external devices coupled to bus 710, used prima rily for interacting With humans, include a display device 714, such as a cathode ray tube (CRT) or a liquid crystal display (LCD), or plasma screen or printer for presenting text or images, and a pointing device 716, such as a mouse or a trackball or cursor direction keys, or motion sensor, for con optic cables, and carrier Waves that travel through space With out Wires or cables, such as acoustic Waves and electromag netic Waves, including radio, optical and infrared Waves. Sig nals include man-made transient variations in amplitude, frequency, phase, polariZation or other physical properties elements presented on the display 714. In some embodi transmitted through the transmission media. [0079] Common forms of computer-readable media include, for example, a ?oppy disk, a ?exible disk, a hard ments, for example, in embodiments in Which the computer system 700 performs all functions automatically Without disk, a magnetic tape, or any other magnetic medium, a com pact disk ROM (CD-ROM), a digital video disk (DVD) or any trolling a position of a small cursor image presented on the display 714 and issuing commands associated With graphical human input, one or more of external input device 712, dis other optical medium, punch cards, paper tape, or any other play device 714 and pointing device 716 is omitted. [0076] In the illustrated embodiment, special purpose hard Ware, such as an application speci?c integrated circuit (ASIC) 720, is coupled to bus 710. The special purpose hardWare is physical medium With patterns of holes, a RAM, a program mable ROM (PROM), an erasable PROM (EPROM), a FLASH-EPROM, or any other memory chip or cartridge, a con?gured to perform operations not performed by processor 702 quickly enough for special purposes. Examples of appli cation speci?c ICs include graphics accelerator cards for transmission medium such as a cable or carrier Wave, or any other medium from Which a computer can read. Information read by a computer from computer-readable media are varia tions in physical expression of a measurable phenomenon on generating images for display 714, cryptographic boards for the computer readable medium. Computer-readable storage encrypting and decrypting messages sent over a netWork, medium is a subset of computer-readable medium Which excludes transmission media that carry transient man-made speech recognition, and interfaces to special external devices, such as robotic arms and medical scanning equipment that signals. repeatedly perform some complex sequence of operations [0080] that are more ef?ciently implemented in hardWare. [0077] Computer system 700 also includes one or more instances of a communications interface 770 coupled to bus includes one or both of processor instructions on a computer Logic encoded in one or more tangible media readable storage media and special purpose hardWare, such as ASIC 720. 710. Communication interface 770 provides a one-Way or [0081] NetWork link 778 typically provides information tWo-Way communication coupling to a variety of external communication using transmission media through one or devices that operate With their oWn processors, such as print ers, scanners and external disks. In general the coupling is With a netWork link 778 that is connected to a local netWork 780 to Which a variety of external devices With their oWn more netWorks to other devices that use or process the infor mation. For example, netWork link 778 may provide a con nection through local netWork 780 to a host computer 782 or to equipment 784 operated by an Internet Service Provider Nov. 4, 2010 US 2010/0280965 A1 (ISP). ISP equipment 784 in turn provides data communica tion services through the public, World-Wide packet-sWitch embodiment of the invention may be implemented. Chip set ing communication network of netWorks noW commonly 800 is programmed to carry out the inventive functions referred to as the Internet 790. A computer called a server host 792 connected to the Internet hosts a process that provides a service in response to information received over the Internet. For example, server host 792 hosts a process that provides described herein and includes, for instance, the processor and memory components described With respect to FIG. 8 incor porated in one or more physical packages. By Way of example, a physical package includes an arrangement of one information representing video data for presentation at dis or more materials, components, and/or Wires on a structural play 714. [0082] [0085] FIG. 8 illustrates a chip set 800 upon Which an assembly (e.g., a baseboard) to provide one or more charac At least some embodiments of the invention are related to the use of computer system 700 for implementing some or all of the techniques described herein. According to one embodiment of the invention, those techniques are per formed by computer system 700 in response to processor 702 executing one or more sequences of one or more processor instructions contained in memory 704. Such instructions, also teristics such as physical strength, conservation of siZe, and/ or limitation of electrical interaction. [0086] In one embodiment, the chip set 800 includes a communication mechanism such as a bus 801 for passing information among the components of the chip set 800. A processor 803 has connectivity to the bus 801 to execute instructions and process information stored in, for example, a called computer instructions, softWare and program code, memory 805. The processor 803 may include one or more may be read into memory 704 from another computer-read processing cores With each core con?gured to perform inde able medium such as storage device 708 or netWork link 778. pendently. A multi-core processor enables multiprocessing Within a single physical package. Examples of a multi-core processor include tWo, four, eight, or greater numbers of Execution of the sequences of instructions contained in memory 704 causes processor 702 to perform one or more of the method steps described herein. In alternative embodi ments, hardWare, such as ASIC 720, may be used in place of or in combination With softWare to implement the invention. processing cores. Alternatively or in addition, the processor 803 may include one or more microprocessors con?gured in tandem via the bus 801 to enable independent execution of Thus, embodiments of the invention are not limited to any instructions, pipelining, and multithreading. The processor speci?c combination of hardWare and softWare, unless other Wise explicitly stated herein. [0083] The signals transmitted over network link 778 and other netWorks through communications interface 770, carry information to and from computer system 700. Computer system 700 can send and receive information, including pro gram code, through the netWorks 780, 790 among others, through netWork link 778 and communications interface 770. 803 may also be accompanied With one or more specialized In an example using the Internet 790, a server host 792 trans mits program code for a particular application, requested by a message sent from computer 700, through Internet 790, ISP equipment 784, local netWork 780 and communications inter face 770. The received code may be executed by processor 702 as it is received, or may be stored in memory 704 or in storage device 708 or other non-volatile storage for later execution, or both. In this manner, computer system 700 may obtain application program code in the form of signals on a components to perform certain processing functions and tasks such as one or more digital signal processors (DSP) 807, or one or more application-speci?c integrated circuits (ASIC) 809. A DSP 807 typically is con?gured to process real-Word signals (e. g., sound) in real time independently of the proces sor 803. Similarly, an ASIC 809 can be con?gured to per formed specialiZed functions not easily performed by a gen eral purposed processor. Other specialiZed components to aid in performing the inventive functions described herein include one or more ?eld programmable gate arrays (FPGA) (not shoWn), one or more controllers (not shoWn), or one or more other special-purpose computer chips. [0087] The processor 803 and accompanying components have connectivity to the memory 805 via the bus 801. The memory 805 includes both dynamic memory (e.g., RAM, Various forms of computer readable media may be magnetic disk, Writable optical disk, etc.) and static memory (e.g., ROM, CD-ROM, etc.) for storing executable instruc involved in carrying one or more sequence of instructions or tions that When executed perform the inventive steps data or both to processor 702 for execution. For example, instructions and data may initially be carried on a magnetic ciated With or generated by the execution of the inventive disk of a remote computer such as host 782. The remote steps. carrier Wave. [0084] described herein. The memory 805 also stores the data asso computer loads the instructions and data into its dynamic [0088] memory and sends the instructions and data over a telephone mobile station (e.g., handset) capable of operating in the line using a modem. A modern local to the computer system 700 receives the instructions and data on a telephone line and system of FIG. 1, according to one embodiment. Generally, a radio receiver is often de?ned in terms of front-end and back end characteristics. The front-end of the receiver encom uses an infra-red transmitter to convert the instructions and data to a signal on an infra-red carrier Wave serving as the netWork link 778. An infrared detector serving as communi cations interface 770 receives the instructions and data car ried in the infrared signal and places information representing the instructions and data onto bus 710. Bus 710 carries the information to memory 704 from Which processor 702 retrieves and executes the instructions using some of the data sent With the instructions. The instructions and data received in memory 704 may optionally be stored on storage device 708, either before or after execution by the processor 702. FIG. 9 is a diagram of example components of a passes all of the Radio Frequency (RF) circuitry Whereas the back-end encompasses all of the base-band processing cir cuitry. Pertinent internal components of the station include a Main Control Unit (MCU) 903, a Digital Signal Processor (DSP) 905, and a receiver/transmitter unit including a micro phone gain control unit and a speaker gain control unit. A main display unit 907 provides a display to the user in support of various applications and mobile station functions. An audio function circuitry 909 includes a microphone 911 and microphone ampli?er that ampli?es the speech signal output Nov. 4, 2010 US 2010/0280965 A1 from the microphone 911. The ampli?ed speech signal output speaker 945, all under control of a Main Control Unit (MCU) from the microphone 911 is fed to a coder/decoder (CODEC) 913. [0089] A radio section 915 ampli?es poWer and converts frequency in order to communicate With a base station, Which is included in a mobile communication system, via antenna 917. The poWer ampli?er (PA) 919 and the transmitter/modu 903*Wh1Cl1 can be implemented as a Central Processing lation circuitry are operationally responsive to the MCU 903, With an output from the PA 919 coupled to the duplexer 921 Unit (CPU) (not shoWn). [0093] The MCU 903 receives various signals including input signals from the keyboard 947. The MCU 903 delivers a display command and a sWitch command to the display 907 and to the speech output sWitching controller, respectively. Further, the MCU 903 exchanges information With the DSP or circulator or antenna sWitch, as knoWn in the art. The PA 905 and can access an optionally incorporated SIM card 949 and a memory 951. In addition, the MCU 903 executes vari ous control functions required of the station. The DSP 905 919 also couples to a battery interface and poWer control unit 920. [0090] In use, a user of mobile station 901 speaks into the microphone 911 and his or her voice along With any detected may, depending upon the implementation, perform any of a variety of conventional digital processing functions on the voice signals. Additionally, DSP 905 determines the back ground noise level of the local environment from the signals background noise is converted into an analog voltage. The detected by microphone 911 and sets the gain of microphone analog voltage is then converted into a digital signal through the Analog to Digital Converter (ADC) 923. The control unit 911 to a level selected to compensate for the natural tendency of the user of the mobile station 901. [0094] The CODEC 913 includes the ADC 923 and DAC 943. The memory 951 stores various data including call 903 routes the digital signal into the DSP 905 for processing therein, such as speech encoding, channel encoding, encrypt ing, and interleaving. In the example embodiment, the pro cessed voice signals are encoded, by units not separately shoWn, using a cellular transmission protocol such as global evolution (EDGE), general packet radio service (GPRS), glo bal system for mobile communications (GSM), Internet pro tocol multimedia subsystem (IMS), universal mobile tele communications system (UMTS), etc., as Well as any other suitable Wireless medium, e. g., microWave access (WiMAX), Long Term Evolution (LTE) netWorks, code division multiple access (CDMA), Wireless ?delity (WiFi), satellite, and the like. [0091] The encoded signals are then routed to an equalizer 925 for compensation of any frequency-dependent impair ments that occur during transmission though the air such as phase and amplitude distortion. After equalizing the bit stream, the modulator 927 combines the signal With a RF signal generated in the RF interface 929. The modulator 927 generates a sine Wave by Way of frequency or phase modula tion. In order to prepare the signal for transmission, an up converter 931 combines the sine Wave output from the modu lator 927 With another sine Wave generated by a synthesiZer 933 to achieve the desired frequency of transmission. The signal is then sent through a PA 919 to increase the signal to an appropriate poWer level. In practical systems, the PA 919 acts as a variable gain ampli?er Whose gain is controlled by the DSP 905 from information received from a netWork base station. The signal is then ?ltered Within the duplexer 921 and incoming tone data and is capable of storing other data includ ing music data received via, e.g., the global Internet. The softWare module could reside in RAM memory, ?ash memory, registers, or any other form of Writable storage medium knoWn in the art. The memory device 951 may be, but not limited to, a single memory, CD, DVD, ROM, RAM, EEPROM, optical storage, or any other non-volatile storage medium capable of storing digital data. [0095] An optionally incorporated SIM card 949 carries, for instance, important information, such as the cellular phone number, the carrier supplying service, subscription details, and security information. The SIM card 949 serves primarily to identify the mobile station 901 on a radio net Work. The card 949 also contains a memory for storing a personal telephone number registry, text messages, and user speci?c mobile station settings. [0096] While the invention has been described in connec tion With a number of embodiments and implementations, the invention is not so limited but covers various obvious modi ?cations and equivalent arrangements, Which fall Within the purvieW of the appended claims. Although features of the invention are expressed in certain combinations among the claims, it is contemplated that these features can be arranged in any combination and order. What is claimed is: 1. A method comprising: receiving data that indicates optionally sent to an antenna coupler 935 to match imped ances to provide maximum poWer transfer. Finally, the signal a contact radius related to hoW socially close a contact is to a user Who is registered With a netWork service, and is transmitted via antenna 917 to a local base station. An an information radius related to hoW private is informa tion about the user; and in response to a request from the contact for information about the user, providing information about the user Which has an information radius value in a range that is automatic gain control (AGC) can be supplied to control the gain of the ?nal stages of the receiver. The signals may be forWarded from there to a remote telephone Which may be another cellular telephone, other mobile phone or a land-line connected to a Public SWitched Telephone NetWork (PSTN), or other telephony netWorks. [0092] Voice signals transmitted to the mobile station 901 are received via antenna 917 and immediately ampli?ed by a loW noise ampli?er (LNA) 937. A doWn-converter 939 loWers the carrier frequency While the demodulator 941 strips aWay the RF leaving only a digital bit stream. The signal then goes through the equaliZer 925 and is processed by the DSP 905. A Digital to Analog Converter (DAC) 943 converts the signal and the resulting output is transmitted to the user through the based on a value of the contact radius associated With the contact. 2. A method of claim 1, Wherein a smaller radius indicates a socially closer contact or more private information, the method further comprising providing information about the user comprises providing information about the user Which has an information radius no less than a contact radius of the contact. 3. A method of claim 1, further comprising initiating pre sentation of a graphical user interface that shoWs: